Showing 216 open source projects for "defense"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhereβ€”across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AIβ€”on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like β€œBuild me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    AzureAD Attack Defense

    AzureAD Attack Defense

    This publication is a collection of various common attack scenarios

    AzureAD-Attack-Defense is a community-maintained playbook that collects common attack scenarios against Microsoft Entra ID (formerly Azure Active Directory) together with detection and mitigation guidance. The repository is organized into focused chapters β€” for example: Password Spray, Consent Grant, Service Principals in Azure DevOps, Entra Connect Sync Service Account, Replay of Primary Refresh Token (PRT), Entra ID Security Config Analyzer, and Adversary-in-the-Middle β€” each written to explain the attack, show detection approaches, and recommend mitigation steps. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Mindustry

    Mindustry

    An open-source sandbox tower defense game

    Mindustry is a tower-defense sandbox factory game. Build supply chains of conveyor belts to fuel your turrets, produce materials for building, and defend your structures from waves of enemies.
    Downloads: 100 This Week
    Last Update:
    See Project
  • 3
    Cryptol

    Cryptol

    Cryptol: The Language of Cryptography

    ...Developed by Galois, Cryptol provides a high-level mathematical syntax for describing cryptographic primitives and enables formal verification of algorithm properties. It is used in academic, research, and defense sectors to validate correctness and security through symbolic execution and model checking, ensuring critical cryptographic code is free of design flaws.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 4
    Arcjet

    Arcjet

    Arcjet JS SDKs. Rate limiting, bot protection, email verification

    Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common attacks. Native security for Bun, Next.js, Node.js, SvelteKit, Vercel, Netlify, Fly.io, and other modern platforms. Customizable protection for signup forms, login pages, API routes, and your whole app. Test security rules locally. Protection that works in every environment. No agent is required.
    Downloads: 8 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 5
    macOS Security Compliance

    macOS Security Compliance

    macOS Security Compliance Project

    ...This is a joint project of federal operational IT Security staff from the National Institute of Standards and Technology (NIST), National Aeronautics and Space Administration (NASA), Defense Information Systems Agency (DISA), and Los Alamos National Laboratory (LANL).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6

    Scalar-Defense-System

    NOTICE OF CONSOLIDATION & PARTNERSHIP PENDING As of April 2026, the 20

    ...Core 'Ford 2026' algorithms remain the proprietary IP of the Ford Peace and Justice Foundation. Academic users at partner institutions are currently performing validation; all other commercial inquiries must contact the author Scalar Defense leverages wave-like properties of Fuzzy Dark Matter to detect, track & deflect asteroids. Manipulating scalar fields (Ο•) & their interference patterns, system creates controlled gravitational potentials can alter asteroid trajectories. Foundation is the two-field FDM model, allows tuning density fringes via mass & velocity parameters
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    anti-distill

    anti-distill

    Anti-distillation for employee Skills

    ...It may also include experimental benchmarks to evaluate how resistant a model is to distillation attempts. Overall, anti-distill represents an emerging area of AI defense focused on safeguarding model behavior and preventing unauthorized replication.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 8
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 9
    IronClaw

    IronClaw

    IronClaw is OpenClaw inspired but focused on privacy & security

    IronClaw is a security-first, open-source personal AI assistant built in Rust and designed to keep your data fully under your control. It operates on the principle that your AI should work for you, not external vendors, ensuring all data is stored locally, encrypted, and never shared. The platform emphasizes transparency, offering auditable code with no hidden telemetry or data harvesting. IronClaw runs untrusted tools inside isolated WebAssembly (WASM) sandboxes with strict capability-based...
    Downloads: 36 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    Santa

    Santa

    A binary authorization system for macOS

    ...Santa is built to help protect users by stopping the spread of malware and analyzing what's running on a computer, but is by no means a total security system. Ideally Santa works as a part of a defense-in-depth strategy, and other measures should be in place to protect hosts.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Apache APISIX

    Apache APISIX

    The cloud-native API gateway

    ...You can use Apache APISIX as a traffic entrance to process all business data, including dynamic routing, dynamic upstream, dynamic certificates, A/B testing, canary release, blue-green deployment, limit rate, defense against malicious attacks, metrics, monitoring alarms, service observability, service governance, etc.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 12
    Kata Containers

    Kata Containers

    Build a standard implementation of lightweight Virtual Machines (VMs)

    ...Kata Containers is an open source community working to build a secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware virtualization technology as a second layer of defense. Since launching in December 2017, the community successfully merged the best parts of Intel Clear Containers with Hyper.sh RunV and scaled to include support for major architectures including AMD64, ARM, IBM p-series, and IBM z-series in addition to x86_64. Kata Containers also supports multiple hypervisors including QEMU, Cloud-Hypervisor, and Firecracker, and integrates with the containerd project among others.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 13
    Tower Building Game

    Tower Building Game

    HTML5 Canvas Tower Building Game

    Tower Building Game is a small game project β€” likely implementing a classic β€œtower defense” or β€œtower-based” game β€” designed to showcase game-development fundamentals such as rendering, game logic, user interaction, and possibly simple physics or animations. As an open-source repository, tower_game aims not only to deliver a playable game, but also to serve as a learning resource or template: developers can inspect its code, understand how game loops, input handling, asset management, and state updates are organized. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 14
    Latte

    Latte

    The safest & truly intuitive templates for PHP

    ...It can modify the page, obtain sensitive information or even steal the user's identity. Templating systems fail to defend against XSS. Latte is the only system with an effective defense, thanks to context-sensitive escaping. Latte is based on PHP, whereas Twig is based on Python. A designer in Latte doesn't have to constantly switch between two different conventions. Stay in touch. The plugin for Tracy informs you on each page which templates and which variables are being rendered. Latte has native support in NetBeans and an excellent plugin for PhpStorm that suggests tags, filters and PHP code. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    GOAD (Gather Open Attack Data) is a security reconnaissance framework for collecting, enriching, and visualizing open-source intelligence (OSINT) around hosts, domains, and certificates. It automates queries to certificate transparency logs, passive DNS, subdomain enumeration, web endpoints, and other public threat feeds. The tool aggregates results into structured formats and can produce interactive graphs to highlight relationships between entities (e.g. domain β†’ IP β†’ cert β†’ ASN). Analysts...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Quantum Shield Orbital Defense Detection

    Quantum Shield Orbital Defense Detection

    NOTICE OF CONSOLIDATION & PARTNERSHIP PENDING As of April 2026, the 20

    ...Core 'Ford 2026' algorithms remain the proprietary IP of the Ford Peace and Justice Foundation. Academic users at partner institutions are currently performing validation; all other commercial inquiries must contact the author QUANTUM SHIELD ORBITAL DEFENSE DETECTION SYSTEM πŸš€ Overview Quantum Shield is a revolutionary defense system leveraging quantum sensing technologies for superior detection capabilities against stealth aircraft, drones, missiles, and submarines. By utilizing quantum entanglement, superposition, and other quantum phenomena, the system offers detection ranges and capabilities far beyond conventional radar systems.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 17
    UUSEC WAF

    UUSEC WAF

    AI and semantic technology Web Application Firewall

    UUSEC WAF Web Application Firewall is an industrial grade free, high-performance, and highly scalable web application and API security protection product that supports AI and semantic engines. It is a comprehensive website protection product launched by UUSEC Technology, which first realizes the three-layer defense function of traffic layer, system layer, and runtime layer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Hardened Slarpx

    Hardened Slarpx

    Experimental hardened Linux based on Xennytsu,Poison,silencer engine

    WARNING: EXPERIMENTAL / UNSTABLE RESEARCH PROJECT. NOT INTENDED FOR DAILY USE. Hardened Slarpx is a Debian-based Linux distribution built with a strict security-first approach. It uses a multi-layered defense model with aggressive mitigations and extensive kernel-level hardening. Due to its highly restrictive firewall policy, anonymization tools and certain network protocols are intentionally unsupported. The distribution includes there custom runtime security modules: Poison , Xennytsu and Silencer. Beyond passive hardening, Slarpx focuses on active intervention, sabotage, and destruction of attack paths when necessary.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 19

    hookprobe

    Free AI that blocks hackers while you sleep. Runs on cheap hardware

    ...It combines eBPF/XDP kernel-level packet filtering with machine learning threat classification to deliver autonomous network security with zero cloud dependency. The stack includes NAPSE (AI packet inspection), HYDRA (threat intelligence pipeline), SENTINEL (ML classification engine), and AEGIS (autonomous defense orchestrator). In production, a single Raspberry Pi 5 processes 11M+ security events, classifies 177K ML verdicts, and tracks 11,800+ attacker IPs β€” all autonomously. Key features: - 5-minute install on Raspberry Pi 5 or any Linux device - eBPF/XDP wire-speed packet filtering and DDoS mitigation - ML-based threat classification (benign/suspicious/malicious - Real-time QSecBit security posture scoring - Web dashboard with live threat visualization - Post-quantum cryptography (Kyber KEM) - Collective mesh defense across nodes
    Downloads: 7 This Week
    Last Update:
    See Project
  • 20
    GpgFrontend

    GpgFrontend

    A Free, Easy-to-Use, Cross-Platform OpenPGP Crypto Tool.

    ...By using GpgFrontend, you can quickly encrypt and decrypt text or files. You can also digitally sign your text or files.GpgFrontend does not need to depend on any server, therefore it may be one of the last lines of defense in protecting your privacy. Please use this tool to transmit or store information that you regard as very precious. You can also use it to guarantee the authenticity of your information.
    Downloads: 94 This Week
    Last Update:
    See Project
  • 21
    Mech Station Beta

    Mech Station Beta

    Mech Station Beta - Tower Defense like Game

    The mech platform floats through levels and progresses over time. It differs significantly from traditional Tower Defense or Survival games. One of the game's key features is the fine-tuned balance of hundreds of gameplay parameters, based on player-collected statistics. However, this feature is not yet fully implemented β€” it requires a server machine, which I currently don’t have due to personal circumstances. If anyone can provide a server machine or a service like Google Virtual Machine, it would be highly useful and greatly appreciated. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    .... πŸ› οΈ The focus is on its technical workings, the ethical implications, and how it can be used in controlled environments for educational purposes. πŸŽ“ It aims to raise awareness about network security πŸ” and the importance of understanding malicious tools for defense and prevention strategies. Fire Your Cannon Now! This is for EDUCATIONAL PURPOSES ONLY thanks!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Betabot

    Betabot

    BDEF, WIE, MInfantry AI opponent

    A basic Bot for old half life 1 mod Support: -Base Defense version 1605: Betabot0001 -War In Europe beta 3: Betabot0101 -Mobile Infantry Beta 1- Training camp: betabot0200
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Dune 2000 Extra

    Dune 2000 Extra

    Dune 2000 Extra Modification (aka D2kx)

    ...The latest modification, *Dune 2000 Extra* (D2kx), takes the game to the next level by introducing a variety of new buildings and units, building on the gameplay improvements introduced in the game's latest patch, version 1.06. This mod adds fresh layers of strategic depth and complexity, offering players new ways to approach both offense and defense on the sand dunes of Arrakis.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 25
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB